Senao Networks UB9700703 Wireless-N USB 2.0 Adapter User Manual Manual Part 1

Senao Networks, Inc. Wireless-N USB 2.0 Adapter Manual Part 1

Contents

Manual Part 1

  IEEE802.b/g/n Wireless LAN  USB 2.0 Client Adapter       User’s Manual         Version: 1.0
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   2  Table of Contents   1 INTRODUCTION ....................................................................................................................5 1.1 FEATURES & BENEFITS ..................................................................................................... 5 1.2 PACKAGE CONTENTS ........................................................................................................ 6 1.3 USB ADAPTER DESCRIPTION ............................................................................................ 6 1.4 SYSTEM REQUIREMENTS .................................................................................................. 6 1.5 APPLICATIONS .................................................................................................................. 7 1.6 NETWORK CONFIGURATION............................................................................................... 7  2 USB ADAPTER FOR WINDOWS VISTA............................................................................... 9 2.1 BEFORE YOU BEGIN ......................................................................................................... 9 2.2 INSTALLING THE DRIVERS.................................................................................................. 9 2.3 PROFILES........................................................................................................................11 2.3.1 INFRASTRUCTURE MODE................................................................................................. 12 2.3.2 AD-HOC MODE ............................................................................................................... 13 2.4 AUTHENTICATION AND SECURITY ..................................................................................... 14 2.4.1 WEP Encryption....................................................................................................... 14 2.4.2 WPA, WPA2 Authentication & TKIP, AES Encryption .............................................. 15 2.4.3 WPA-PSK Authentication & TKIP, AES Encryption.................................................. 16 2.5 LINK STATUS .................................................................................................................. 17 2.6 SITE SURVEY ................................................................................................................. 18 2.7 STATISTICS..................................................................................................................... 19 2.8 WPS ............................................................................................................................. 20 2.9 ABOUT ........................................................................................................................... 21 2.10 UNINSTALL THE DRIVERS & CLIENT UTILITY...................................................................... 22  3 USB ADAPTER FOR WINDOWS XP .................................................................................. 25 3.1 BEFORE YOU BEGIN ....................................................................................................... 25 3.2 INSTALLING THE DRIVERS................................................................................................ 25 3.3 PROFILES....................................................................................................................... 28 3.3.1 INFRASTRUCTURE MODE................................................................................................. 28 3.3.2 AD-HOC MODE ............................................................................................................... 29 3.4 AUTHENTICATION AND SECURITY ..................................................................................... 30 3.4.1 WEP Encryption....................................................................................................... 30 3.4.2 WPA, WPA2 Authentication & TKIP, AES Encryption .............................................. 31 3.4.3 WPA-PSK Authentication & TKIP, AES Encryption.................................................. 31 3.4.4 LEAP Authentication ................................................................................................ 32 3.4.5 802.1x with PEAP .................................................................................................... 33 3.4.5.1 PEAP Authentication with EAP/TLS Smartcard .................................................. 33 3.4.6 802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2.................................... 34 3.4.7 802.1x CA Server..................................................................................................... 34 3.5 NETWORK ...................................................................................................................... 35 3.5.1 SITE SURVEY ................................................................................................................. 37 3.6 ADVANCED CONFIGURATION............................................................................................ 38 3.7 STATISTICS..................................................................................................................... 38 3.8 WMM (WIRELESS MULTIMEDIA) ...................................................................................... 40 3.9 WPS ............................................................................................................................. 40 3.10 ABOUT ........................................................................................................................... 42 3.11 RADIO............................................................................................................................ 42
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   3  3.12 UNINSTALL THE DRIVERS & CLIENT UTILITY...................................................................... 43  4 USB ADAPTER FOR MAC OS X......................................................................................... 46 4.1 INSTALLING THE DRIVERS................................................................................................ 46 4.2 PROFILES....................................................................................................................... 48 4.2.1 INFRASTRUCTURE MODE................................................................................................. 49 4.2.2 AD-HOC MODE ............................................................................................................... 50 4.3 AUTHENTICATION AND SECURITY ..................................................................................... 52 4.3.1 WEP Encryption....................................................................................................... 52 4.3.2 WPA-PSK Authentication & TKIP, AES Encryption.................................................. 53 4.4 LINK STATUS .................................................................................................................. 53 4.5 SITE SURVEY ................................................................................................................. 55 4.6 STATISTICS..................................................................................................................... 55 4.7 ADVANCED CONFIGURATION............................................................................................ 56 4.8 ABOUT ........................................................................................................................... 58  APPENDIX A – GLOSSARY......................................................................................................... 59 APPENDIX B – SPECIFICATIONS............................................................................................... 71 APPENDIX C – FCC INTERFERENCE STATEMENT ................................................................. 72
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   4  Revision History  Version Date  Notes 1.0  October 17, 2007  Initial Version
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   5  1 Introduction  The high-speed wireless USB 2.0 client adapter is the most convenient way to let you put a desktop/notebook computer almost anywhere without the hassle of running network cables. Now you don’t need to suffer from drilling holes and exposed cables. Once you are connected, you can do anything, just like the wired network. This USB client adapter operates seamlessly in 2.4GHz frequency spectrum supporting the 802.11b, 802.11g, and 802.11nwireless standards. It’s the best way to add wireless capability to your existing wired network or simply surf the web.   To protect your wireless connectivity, the high-speed wireless USB 2.0 client adapter can encrypt all wireless transmissions through 64/128-bit WEP, WPA, WPA-PSK and WPA-AES encryption and authentication allowing you to experience the most secure wireless connectivity available.  The Engenius 802.11n USB Adapter (EUB-9702) implements the latest 11n 2.0 technology which extremely improves wireless signal for your computer than existing wireless 802.11g technology. It supports the 1T2R MIMO architecture with fully forward compatibility with IEEE802.11n. The incredible speed of EUB-9702 USB adapter makes heavy traffic networking activities more flexible and takes the wireless into practical road. You could enjoy the racing speed of wireless connection, surfing on Internet without string wires.   Adding Engenius EUB-9702 to your Notebook or Computer, it provides an excellent performance and cost-effective solution for doing media-centric activities such as streaming video, gaming, and enhances the QoS (WMM) without any reduction of performance. It extends 3 times network coverage and boosts 6 times transmission throughput than existing 11g product. Advanced power management and low power consumption among 11n products.  For more security-sensitive application, EUB-9702 supports Hardware-based IEEE 802.11i encryption/decryption engine, including 64-bit/128-bit WEP, TKIP, and AES. Also, it supports Wi-Fi alliance WPA and WPA2 encryption and is Cisco CCX V1.0, V2.0 and V3.0 compliant.   1.1  Features & Benefits Features  Benefits Racing Speed up to 300Mbps Rx PHY  rate (2.4GHz 11N technology) Enjoy the Internet connection in crazy-fast speed, without the bottleneck of stringing wires. Advanced power management  Low power consumption WPA/WPA2 (IEEE 802.11i), WEP 64/128 Support Powerful data security. Support 1Tx * 2Rx Radios  With Intelligent Antenna enables
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   6  WMM (IEEE 802.11e) standard support   Wireless Multimedia Enhancements Quality of Service support (QoS) / enhanced power saving for Dynamic Networking USB 2.0/1.1  USB 2.0 interface and compatible with USB 1.1   1.2 Package Contents Open the package carefully, and make sure that none of the items listed below are missing. Do not discard the packing materials, in case of return; the unit must be shipped in its original package.  h  One Wireless LAN USB Adapter h  One CD-ROM with Drivers and User’s Manual Included h  One Quick Installation Guide   1.3  USB Adapter Description The USB adapter is a standard USB adapter that fits into any USB interface.  The USB adapter has two LED indicators and a built-in antenna.                1.4 System Requirements The following are the minimum system requirements in order to use the USB adapter. h  PC/AT compatible computer with a USB interface. h  Windows 2000/XP/Vista or MAC OS operating system. h  30 MB of free disk space for installing the USB adapter driver and utility program.    PWR and LINK LED Indicator USB Connector
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   7  1.5 Applications The wireless LAN products are easy to install and highly efficient. The following list describes some of the many applications made possible through the power and flexibility of wireless LANs:   a) Difficult-to-wire environments There are many situations where wires cannot be laid easily. Historic buildings, older buildings, open areas and across busy streets make the installation of LANs either impossible or very expensive. b) Temporary workgroups Consider situations in parks, athletic arenas, exhibition centers, disaster-recovery, temporary offices and construction sites where one wants a temporary WLAN established and removed. c)  The ability to access real-time information Doctors/nurses, point-of-sale employees, and warehouse workers can access real-time information while dealing with patients, serving customers and processing information. d) Frequently changed environments Show rooms, meeting rooms, retail stores, and manufacturing sites where frequently rearrange the workplace. e)  Small Office and Home Office (SOHO) networks SOHO users need a cost-effective, easy and quick installation of a small network. f)  Wireless extensions to Ethernet networks Network managers in dynamic environments can minimize the overhead caused by moves, extensions to networks, and other changes with wireless LANs. g) Wired LAN backup Network managers implement wireless LANs to provide backup for mission-critical applications running on wired networks. h) Training/Educational facilities Training sites at corporations and students at universities use wireless connectivity to ease access to information, information exchanges, and learning.   1.6 Network Configuration To better understand how the wireless LAN products work together to create a wireless network, it might be helpful to depict a few of the possible wireless LAN PC card network configurations. The wireless LAN products can be configured as:  a)  Ad-hoc (or peer-to-peer) for departmental or SOHO LANs. b) Infrastructure for enterprise LANs.  a) Ad-hoc (peer-to-peer) Mode  This is the simplest network configuration with several computers equipped with the PC Cards that form a wireless network whenever they
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   8  are within range of one another.  In ad-hoc mode, each client is peer-to-peer, would only have access to the resources of the other client and does not require an access point. This is the easiest and least expensive way for the SOHO to set up a wireless network. The image below depicts a network in ad-hoc mode.                    b) Infrastructure Mode  The infrastructure mode requires the use of an Access Point (AP). In this mode, all wireless communication between two computers has to be via the AP. It doesn’t matter if the AP is stand-alone or wired to an Ethernet network. If used in stand-alone, the AP can extend the range of independent wireless LANs by acting as a repeater, which effectively doubles the distance between wireless stations.  The image below depicts a network in infrastructure mode.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   9  2  USB Adapter for Windows Vista  2.1 Before You Begin During the installation, Vista may need to copy systems files from its installation CD. Therefore, you may need a copy of the Windows installation CD at hand before installing the drivers.   2.2  Installing the Drivers Follow the steps below in order to install the USB adapter drivers:  1.  Insert the CD-ROM that was provided to you in this package. The setup should run automatically. If the setup does not run automatically, then you must manually select the setup.exe file from the CD-ROM drive.    2. Once the setup begins you will see the InstallShield Wizard. Select EnGenius Configuration Tool and then click on the Next> button.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   10    3. Click on the Install button to begin the installation.     4.  The installation is complete. Click on the Finish button.  5.  Carefully insert the USB adapter into the USB port. Windows will then detect and install the new hardware.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   11      6. An EG icon will then appear in the system tray. Right click on the EG icon and then click on Launch Config Utilities. Note: Click on Use Zero Configuration as Configuration Utility if you would like to use Windows Zero Config.     2.3 Profiles The Profile  tab is used to store the settings of multiple Access Points such as home, office, café, etc. When adding a profile you are required to enter a profile name and SSID as well as configure the power-saving mode, network type, RTS/fragmentation threshold and encryption/authentication settings.  A profile can be configured as Infrastructure or Ad-hoc mode. The configuration settings for each mode are described below.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   12  2.3.1 Infrastructure Mode The infrastructure mode requires the use of an Access Point (AP). In this mode, all wireless communication between two computers has to be via the AP. It doesn’t matter if the AP is stand-alone or wired to an Ethernet network. If used in stand-alone, the AP can extend the range of independent wireless LANs by acting as a repeater, which effectively doubles the distance between wireless stations.    h Profile: Enter a name for the profile; this does not need to be the same as the SSID.  h SSID: Enter the SSID of the network or select one from the drop-down list. The SSID is a unique name shared among all points in your wireless network. The SSID must be identical for all points in the network, and is case-sensitive. h Network Type: Select Infrastructure from the drop-down list.  h TX Power: Select a transmit power from the drop-down list. If your notebook is connected to external power then select 100% or auto, if not, select one of the lower values for power saving.  h Click on the Apply button to save the changes.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   13  2.3.2 Ad-hoc Mode This is the simplest network configuration with several computers equipped with the PC Cards that form a wireless network whenever they are within range of one another.  In ad-hoc mode, each client is peer-to-peer, would only have access to the resources of the other client and does not require an access point. This is the easiest and least expensive way for the SOHO to set up a wireless network.    h Profile: Enter a name for the profile; this does not need to be the same as the SSID.  h SSID: Enter the SSID of the network or select one from the drop-down list. The SSID is a unique name shared among all points in your wireless network. The SSID must be identical for all points in the network, and is case-sensitive. h Network Type: Select Ad-hoc from the drop-down list.  h TX Power: Select a transmit power from the drop-down list. If your notebook is connected to external power then select 100% or auto, if not, select one of the lower values for power saving.  h Click on the Apply button to save the changes.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   14  2.4  Authentication and Security The  Security tab allows you to configure the authentication and encryption settings such as: WEP, WPA, WPA-PSK. Each security option is described in detail below.   2.4.1 WEP Encryption  The  WEP tab displays the WEP settings. Encryption is designed to make the data transmission more secure. You may select 64 or 128-bit WEP (Wired Equivalent Privacy) key to encrypt data (Default setting is Disable). WEP encrypts each frame transmitted from the radio using one of the Keys from a panel. When you use WEP to communicate with the other wireless clients, all the wireless devices in this network must have the same encryption key or pass phrase.  The following information is included in this tab, as the image depicts below.    h Authentication Type: Select Open or Shared from the drop-down list.  h Encryption: Select WEP from the drop-down list.  h WEP Key: Type a character string into the field. For 64-bit enter 5 alphanumeric or 10 hexadecimal characters. For 128-bit enter 13 alphanumeric or 26 hexadecimal characters.  h Click on the Apply button to save the changes.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   15  h Show Password check box. If you want to make sure the accuracy of password you type, click the Show Password box to check it.  2.4.2  WPA, WPA2 Authentication & TKIP, AES Encryption  WPA (Wi-Fi Protected Access) was designed to improve upon the security features of WEP (Wired Equivalent Privacy).  The technology is designed to work with existing Wi-Fi products that have been enabled with WEP.  WPA provides improved data encryption through the Temporal Integrity Protocol (TKIP), which scrambles the keys using a hashing algorithm and by adding an integrity-checking feature which makes sure that keys haven’t been tampered with. EAP (Extensible Authentication Protocol) is an extension to the PPP protocol that enables a variety of authentication protocols to be used. It passes through the exchange of authentication messages, allowing the authentication software stored in a server to interact with its counterpart in the client.    h Authentication Type: Select WPA or WPA2 from the drop-down list.  h Encryption: Select TKIP or AES from the drop-down list.  h Click on the Apply button to save the changes.  h Show Password check box. If you want to make sure the accuracy of password you type, click the Show Password box to check it.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   16  2.4.3  WPA-PSK Authentication & TKIP, AES Encryption  WPA – PSK (Pre-shared Key) is used in a Pre Shared Key mode that does not require an authentication server.  Access to the Internet and the rest of the wireless network services is allowed only if the pre-shared key of the computer matches that of the Access Point.  This approach offers the simplicity of the WEP key, but uses stronger TKIP encryption. EAP (Extensible Authentication Protocol) is an extension to the PPP protocol that enables a variety of authentication protocols to be used. It passes through the exchange of authentication messages, allowing the authentication software stored in a server to interact with its counterpart in the client.    h Authentication Type: Select WPA or WPA2 from the drop-down list.  h Encryption: Select TKIP or AES from the drop-down list.  h WPA Preshared key: Enter a pass phrase which is between 8 and 32 characters long.  h Click on the Apply button to save the changes.  h Show Password check box. If you want to make sure the accuracy of password you type, click the Show Password box to check it.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   17  2.5 Link Status The Link Status tab displays the current status of the wireless radio.  The following information is included in this tab, as the image depicts below.    h Status: This indicates the state of the client. There are three options: o Associated: Indicates that the wireless client is connected to an Access Point (AP).  The BSSID is shown in the form of 12 HEX digits, which is the MAC address of the AP. o Scanning: Indicates that the wireless client is searching for an AP in the area. o Disconnected: Indicates that there are no APs or clients in the area.  h Extra Info: Displayed here are information about the link stats and the percent of output power.  h Current Channel: The operating frequency channel that the client is using (infrastructure mode).  h Link Speed: The current rate at which the client is transmitting and receiving. h Throughput (bytes/sec): Displays the Tx (transmit) and Rx (receive) kilo-bytes per second. h Link Quality: In infrastructure mode, this bar displays the transmission quality between an AP and a client. In Ad-hoc mode, this bar displays the transmission quality between one client, and another. h Signal Strength: This bar displays the strength of the signal received from an AP or client. h Noise Level: Displays the background noise level; a lower level indicates less interference.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   18  h Click on the OK button to close this window. h dBm Check Box. When you click on the check box as the drawing below. The signal strength and noise level will be shown as the dBm measurements.   2.6 Site Survey The Site Survey tab displays a list of Access Points and Stations in the area, and allows you to connect to a specific one.  The following information is included in this tab, as the image depicts below.    h SSID: Displays the SSID of the Access Point. The SSID is a unique name shared among all points in your wireless network. The SSID must be identical for all points in the network, and is case-sensitive. h BSSID: Displays the MAC address of the Access Point. h Signal: Displays the receiving signal strength from the Access Point.  h Channel: Displays the channel number of the Access Point. h Encryption: Displays the encryption on the Access Point, this includes WEP, TKIP, AES or None. h Authentication: displays the authentication on the Access Point, this includes WPA, WPA-PSK, WPA2, or Unknown. h Network Type: Indicates whether the SSID is a Station (Ad-hoc) or Access Point (Infrastructure). h Rescan: Click on this button to view a list of Access Points in the area. h Connect: to connect with a specific Access Point, select the SSID from the list, and then click on the Connect button.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   19  h Add to Profile: Click on this button to add the SSID and its associated settings into a profile.  h Click on the OK button if you have made any changes.   2.7 Statistics The  Statistics  tab displays transmit and receive packet statistics in real-time. Information included is frames transmitted/received successfully, transmitted successfully without and after retry, received with CRC error, duplicate frames received, etc.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   20  2.8 WPS Click on the WPS Configuration tab. WPS (Wireless Push Button) is used for WiFi Protected Setup. By pressing this button, the security settings of the device will automatically synchronize with other wireless devices on your network that support Wi-Fi Protected Setup.    h Rescan: Click on this button to view a list of Access Points in the area. h WPS Information: h Pin Code: h Config Mode: h Detail: h Connect: h Rotate: h Disconnect: h Import Profile: h PBC: h WPS Associate IE: h WPS Probe IE: h Click on the OK button if you have made any changes.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   21  2.9 About The About tab displays information about the device, such as: the network driver version and date, configuration utility version and date, and the NIC (Network Interface Card) firmware version and date.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   22  2.10  Uninstall the Drivers & Client Utility If the USB client adapter installation is unsuccessful for any reason, the best way to solve the problem may be to completely uninstall the USB adapter and its utility and repeat the installation procedure again.  Follow the steps below in order to uninstall the client utility:  1. Click on Start > EnGenius Wireless > Uninstall EnGenius Wireless USB Adapter      2.  The un-installation process will then begin.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   23    3. Select the Remove all button and then click on the Next button.     4. Click on the Yes button to confirm the un-installation process.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   24    5.  The un-installation process is complete. Select Yes, I want to restart my computer now radio button and then click on the Finish button. Then remove the USB adapter.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   25  3  USB Adapter for Windows XP  3.1 Before You Begin During the installation, XP may need to copy systems files from its installation CD. Therefore, you may need a copy of the Windows installation CD at hand before installing the drivers. On many systems, instead of a CD, the necessary installation files are archived on the hard disk in C:\WINDOWS \OPTIONS\CABS directory.   3.2  Installing the Drivers Follow the steps below in order to install the USB adapter drivers:  7.  Insert the CD-ROM that was provided to you in this package. The setup should run automatically. If the setup does not run automatically, then you must manually select the setup.exe file from the CD-ROM drive.    8. Once the setup begins you will see the InstallShield Wizard. Select EnGenius Configuration Tool and then click on the Next> button.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   26     9. Click on the Install button to begin the installation.     10. Wait for a few seconds until the driver and client utility is installed.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   27    11. The installation is complete. Click on the Finish button.  12. Carefully insert the USB adapter into the USB port. Windows will then detect and install the new hardware.     13. An EG icon will then appear in the system tray. Right click on the EG icon and then click on Launch Config Utilities. Note: Click on Use Zero Configuration as Configuration Utility if you would like to use Windows Zero Config.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   28   3.3 Profiles The Profile  tab is used to store the settings of multiple Access Points such as home, office, café, etc. When adding a profile you are required to enter a profile name and SSID as well as configure the power-saving mode, network type, RTS/fragmentation threshold and encryption/authentication settings.  A profile can be configured as Infrastructure or Ad-hoc mode. The configuration settings for each mode are described below.    3.3.1 Infrastructure Mode The infrastructure mode requires the use of an Access Point (AP). In this mode, all wireless communication between two computers has to be via the AP. It doesn’t matter if the AP is stand-alone or wired to an Ethernet network. If used in stand-alone, the AP can extend the range of independent wireless LANs by acting as a repeater, which effectively doubles the distance between wireless stations.    h Profile: Enter a name for the profile; this does not need to be the same as the SSID.  h SSID: Enter the SSID of the network or select one from the drop-down list. The SSID is a unique name shared among all points in your wireless network. The SSID must be identical for all points in the network, and is case-sensitive. h PSM: Select a power saving mode (PSM) option.  o CAM (Continuously Awake Mode): Select this option if your notebook is always connected to the power supply.  o PSM (Power Saving Mode): Select this option if your notebook uses its battery power. This option minimizes the battery usage while the network is idle.  h Network Type: Select Infrastructure from the drop-down list.  h TX Power: Select a transmit power from the drop-down list. If your notebook is connected to external power then select 100% or auto, if not, select one of the lower values for power saving.  h RTS Threshold: Place a check in this box if you would like to enable
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   29  RTS Threshold. Any packet in the RTS/CTS handshake larger than the specified value (bytes) will be discarded.   h Fragment Threshold: Place a check in this box if you would like to enable Fragment Threshold. Any packet larger than the specified value (bytes) will be discarded.  h Click on the OK button to save the changes.     3.3.2 Ad-hoc Mode This is the simplest network configuration with several computers equipped with the PC Cards that form a wireless network whenever they are within range of one another.  In ad-hoc mode, each client is peer-to-peer, would only have access to the resources of the other client and does not require an access point. This is the easiest and least expensive way for the SOHO to set up a wireless network.    h Profile: Enter a name for the profile; this does not need to be the same as the SSID.  h SSID: Enter the SSID of the network or select one from the drop-down list. The SSID is a unique name shared among all points in your wireless network. The SSID must be identical for all points in the network, and is case-sensitive. h Network Type: Select Ad-hoc from the drop-down list.  h TX Power: Select a transmit power from the drop-down list. If your notebook is connected to external power then select 100% or auto, if not, select one of the lower values for power saving.  h Click on the OK button to save the changes.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   30  3.4  Authentication and Security The  Security tab allows you to configure the authentication and encryption settings such as: WEP, WPA, WPA-PSK, WPA2, and 802.1x. Each security option is described in detail below.      3.4.1 WEP Encryption  The  WEP tab displays the WEP settings. Encryption is designed to make the data transmission more secure. You may select 64 or 128-bit WEP (Wired Equivalent Privacy) key to encrypt data (Default setting is Disable). WEP encrypts each frame transmitted from the radio using one of the Keys from a panel. When you use WEP to communicate with the other wireless clients, all the wireless devices in this network must have the same encryption key or pass phrase.  The following information is included in this tab, as the image depicts below.    h Authentication Type: Select Open or Shared from the drop-down list.  h Encryption: Select WEP from the drop-down list.  h WEP Key: Type a character string into the field. For 64-bit enter 5 alphanumeric or 10 hexadecimal characters. For 128-bit enter 13 alphanumeric or 26 hexadecimal characters.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   31  h Click on the Apply button to save the changes.  h Show Password check box. If you want to make sure the accuracy of password you type, click the Show Password box to check it.  3.4.2  WPA, WPA2 Authentication & TKIP, AES Encryption  WPA (Wi-Fi Protected Access) was designed to improve upon the security features of WEP (Wired Equivalent Privacy).  The technology is designed to work with existing Wi-Fi products that have been enabled with WEP.  WPA provides improved data encryption through the Temporal Integrity Protocol (TKIP), which scrambles the keys using a hashing algorithm and by adding an integrity-checking feature which makes sure that keys haven’t been tampered with. EAP (Extensible Authentication Protocol) is an extension to the PPP protocol that enables a variety of authentication protocols to be used. It passes through the exchange of authentication messages, allowing the authentication software stored in a server to interact with its counterpart in the client.    h Authentication Type: Select WPA or WPA2 from the drop-down list.  h Encryption: Select TKIP or AES from the drop-down list.  h Click on the Apply button to save the changes.  h Show Password check box. If you want to make sure the accuracy of password you type, click the Show Password box to check it.  3.4.3  WPA-PSK Authentication & TKIP, AES Encryption  WPA – PSK (Pre-shared Key) is used in a Pre Shared Key mode that does not require an authentication server.  Access to the Internet and the rest of the wireless network services is allowed only if the pre-shared key of the computer matches that of the Access Point.  This approach offers the simplicity of the WEP key, but uses stronger TKIP encryption. EAP (Extensible Authentication Protocol) is an extension to the PPP protocol that enables a variety of authentication protocols to be used. It passes through the exchange of authentication messages, allowing the authentication software stored in a server to interact with its counterpart in the client.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   32    h Authentication Type: Select WPA or WPA2 from the drop-down list.  h Encryption: Select TKIP or AES from the drop-down list.  h WPA Preshared key: Enter a pass phrase which is between 8 and 32 characters long.  h Click on the Apply button to save the changes.  h Show Password check box. If you want to make sure the accuracy of password you type, click the Show Password box to check it.  3.4.4  LEAP Authentication   LEAP (Lightweight Extensible Authentication Protocol) also known as Cisco-Wireless EAP provides username/password-based authentication between a wireless client and a RADIUS server.  LEAP is one of several protocols used with the IEEE 802.1X standard for LAN port access control. LEAP also delivers a session key to the authenticated station, so that future frames can be encrypted with a key that is different than keys used by others sessions. Dynamic key delivery eliminates one big vulnerability; static encryption keys that are shared by all stations in the WLAN. EAP (Extensible Authentication Protocol) is an extension to the PPP protocol that enables a variety of authentication protocols to be used. It passes through the exchange of authentication messages, allowing the authentication software stored in a server to interact with its counterpart in the client
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   33  h Authentication Type: Select LEAP from the drop-down list.  h Identity: Enter the user name. h Password: Enter the password. h Domain: Enter a domain name. h Encryption: Select WEP, WPA-TKIP or WPA2-AES encryption. h Click on the OK button to save the changes.   3.4.5 802.1x with PEAP  802.1X provides an authentication framework for wireless LANs allowing a user to be authenticated by a central authority. 802.1X uses an existing protocol called EAP. EAP (Extensible Authentication Protocol) is an extension to the PPP protocol that enables a variety of authentication protocols to be used. It passes through the exchange of authentication messages, allowing the authentication software stored in a server to interact with its counterpart in the client.  3.4.5.1  PEAP Authentication with EAP/TLS Smartcard  EAP/TLS Smartcard provides for certificate-based and mutual authentication of the client and the network. It relies on client-side and server-side certificates to perform authentication and can be used to dynamically generate user-based and session-based WEP keys to secure subsequent communications between the WLAN client and the access point.    h Authentication Type: Select PEAP from the drop-down list.  h Protocol: If your network uses TLS or Smart Card to authenticate its users, select  TLS/Smartcard from the drop down list. TLS (Transport Layer Security) is an IETF standardized authentication protocol that uses PKI (Public Key Infrastructure) certificate-based authentication of both the client and authentication server. h Identity: Enter the user name. h Click on the OK button to save the changes.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   34  3.4.6 802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2  802.1X provides an authentication framework for wireless LANs allowing a user to be authenticated by a central authority. 802.1X uses an existing protocol called EAP. EAP (Extensible Authentication Protocol) is an extension to the PPP protocol that enables a variety of authentication protocols to be used. It passes through the exchange of authentication messages, allowing the authentication software stored in a server to interact with its counterpart in the client. TLS (Transport Layer Security) is an IETF standardized authentication protocol that uses PKI (Public Key Infrastructure) certificate based authentication of both the client and authentication server.    h Authentication Type: Select TTLS from the drop-down list.  h Protocol: Select EAP-MSCHAP v2, MS-CHAP, or CHAP from the drop-down list.  h Identity: Enter the user name. h Password: Enter the password.  h Click on the OK button to save the changes.   3.4.7  802.1x CA Server  Depending on the EAP in use, only the server or both the server and client may be authenticated and require a certificate. Server certificates identify a server, usually an authentication or RADIUS server to clients. Most EAPs require a certificate issued by a root authority or a trusted commercial Certificate Authority.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   35      h Use certificate chain: Place a check in this to enable the certificate use.  h Certificate issuer: Select the Certification Authority from the drop-down list.  h Allow intermediate certificates: During tunnel creation the client must verify the server’s certificate. When checking this certificate the signature is verified against a list of trusted certificate authorities. If this parameter is true then the client will also accept a signature from a trusted intermediate certificate authority, otherwise it will not. h Server name: Enter the server name if not selected from the existing drop-down list above.  h Click on the OK button to save the changes.    3.5 Network The Network tab displays the current status of the wireless radio.  The following information is included in this tab, as the image depicts below.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   36    h Status: This indicates the state of the client. There are three options: o Associated: Indicates that the wireless client is connected to an Access Point (AP).  The BSSID is shown in the form of 12 HEX digits, which is the MAC address of the AP. o Scanning: Indicates that the wireless client is searching for an AP in the area. o Disconnected: Indicates that there are no APs or clients in the area.  h Extra Info: Displayed here are information about the link stats and the percent of output power.  h Channel: The operating frequency channel that the client is using (infrastructure mode). h Authentication: Displays the authentication type. h Encryption: Displays the encryption type. h Network Type: Displays the network type; infrastructure or ad-hoc. h IP Address: Displays the IP address. h Sub Mask: Displays the subnet mask IP address. h Default Gateway: Displays the IP address of the default gateway.   h Link Speed: The current rate at which the client is transmitting and receiving. h Transmit/ReceiveThroughput: Displays the Tx (transmit) and Rx (receive) kilo-bytes per second. h Link Quality: In infrastructure mode, this bar displays the transmission quality between an AP and a client. In Ad-hoc mode, this bar displays the transmission quality between one client, and another. h Signal Strength: This bar displays the strength of the signal received from an AP or client. h Noise Level: Displays the background noise level; a lower level indicates less interference.  h Click on the OK button to close this window.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   37  3.5.1 Site Survey The Site Survey tab displays a list of Access Points and Stations in the area, and allows you to connect to a specific one.  The following information is included in this tab, as the image depicts below.    h SSID: Displays the SSID of the Access Point. The SSID is a unique name shared among all points in your wireless network. The SSID must be identical for all points in the network, and is case-sensitive. h Channel: Displays the channel number of the Access Point. h Encryption: Displays the encryption on the Access Point, this includes WEP, TKIP, AES or None.  h Signal: Displays the receiving signal strength from the Access Point.  h Rescan: Click on this button to view a list of Access Points in the area. h Connect: to connect with a specific Access Point, select the SSID from the list, and then click on the Connect button. h Add to Profile: Click on this button to add the SSID and its associated settings into a profile.  h Click on the OK button if you have made any changes.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   38  3.6 Advanced Configuration The Advanced tab is used to configure the wireless mode (802.11g, 802.11b/g-mixed, or 802.11b/g/n-mixed), and CCX.      h  Wireless mode: Select 802.11 b/g/n mix if the wireless network uses both 11b, 11g, and 11n stations and APs. B/G Protection: This is the ERP protection mode of 802.11g. Selecting auto will dynamically send frames with and without protection. Select On to send a frame without protection, and Off to send it with protection.   h Enable TCP Window Size: Enhance the throughput if enable this function.  h CCX: Enable this option if the network supports Cisco Compatible Extensions.  h Click on the Apply button to close this window.   3.7 Statistics  The  Statistics  tab displays transmit and receive packet statistics in real-time. Information included is frames transmitted/received successfully, transmitted successfully without and after retry, received with CRC error, duplicate frames received, etc.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   39
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   40  3.8  WMM (Wireless Multimedia) Click on the WMM tab. Wireless Multimedia Extensions (WME), also known as Wi-Fi Multimedia (WMM) is a Wi-Fi Alliance interpretability certification, based on the IEEE 802.11e draft standard. It provides basic Quality of service (QoS) features to IEEE 802.11 networks. WMM prioritizes traffic according to 4 AC (Access Categories), however it does not provide guaranteed throughput. It is suitable for simple applications that require QoS, such as Wi-Fi Voice over IP (VoIP) phone.    h WMM Enable: Choose to enable or disable WMM. h WMM Power Save Enable: Choose to enable or disable power save mode on WMM. h Direct Link Setup Enable: Specify a MAC address and timeout value.  h Click on the Apply button to close this window.   3.9 WPS WPS (Wireless Push Button) is used for WiFi Protected Setup. By pressing this button, the security settings of the device will automatically synchronize with other wireless devices on your network that support Wi-Fi Protected Setup.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   41    h Rescan: Click on this button to view a list of Access Points in the area. h WPS Information: h Pin Code: h Config Mode: h Detail: h Connect: h Rotate: h Disconnect: h Import Profile: h PBC: h WPS Associate IE: h WPS Probe IE: h Click on the OK button if you have made any changes.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   42  3.10  About The About tab displays information about the device, such as: the network driver version and date, configuration utility version and date, and the NIC (Network Interface Card) firmware version and date.       3.11   Radio The Radio tab allows you to enable or disable the radio.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   43  3.12  Uninstall the Drivers & Client Utility If the USB client adapter installation is unsuccessful for any reason, the best way to solve the problem may be to completely uninstall the USB adapter and its utility and repeat the installation procedure again.  Follow the steps below in order to uninstall the client utility:  1. Click on Start > EnGenius Wireless > Uninstall EnGenius Wireless USB Adapter      2.  The un-installation process will then begin.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   44    3. Select the Remove all button and then click on the Next button.     4. Click on the Yes button to confirm the un-installation process.
IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0   45    5.  The un-installation process is complete. Select Yes, I want to restart my computer now radio button and then click on the Finish button. Then remove the USB adapter.

Navigation menu